Network Coding in P2P-Systems Christian Ortolf. Overview ● Introduction ● Galois fields ● Encoding/Decoding of Files ● Gain – Coupon Collector's problem.

Slides:



Advertisements
Similar presentations
Enhanced matrix multiplication algorithm for FPGA Tamás Herendi, S. Roland Major UDT2012.
Advertisements

Secure Cloud Storage meets with Secure Network Coding
On-the-fly Verification of Erasure-Encoded File Transfers Mike Freedman & Max Krohn NYU Dept of Computer Science.
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
Alex Dimakis based on collaborations with Dimitris Papailiopoulos Arash Saber Tehrani USC Network Coding for Distributed Storage.
Factoring of Large Numbers using Number Field Sieve Matrix Step Chandana Anand, Arman Gungor, and Kimberly A. Thomas ECE 646 Fall 2006.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Yuchong Hu1, Henry C. H. Chen1, Patrick P. C. Lee1, Yang Tang2
Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University.
1 Communication Networks Kolja Eger, Prof. Dr. U. Killat 1 From Packet-level to Flow-level Simulations of P2P Networks Kolja Eger, Ulrich Killat Hamburg.
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
Onur G. Guleryuz & Ulas C.Kozat DoCoMo USA Labs, San Jose, CA 95110
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission(2004) CMPT 886 Represented By: Lilong Shi.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Chien Hsing James Wu David Gottesman Andrew Landahl.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
On-The-Fly Verification of Rateless Erasure Codes Max Krohn (MIT CSAIL) Michael Freedman and David Mazières (NYU)
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Forward Error Correction Steven Marx CSC45712/04/2001.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Swarming on Optimized Graphs for n-way Broadcast Georgios Smaragdakis joint work with Nikolaos Laoutaris, Pietro Michiardi, Azer Bestavros, John Byers,
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
Optimal Multicast Algorithms Sidharth Jaggi Michelle Effros Philip A. Chou Kamal Jain.
Comprehensive View of a Live Network Coding P2P System Presented by: Kenny, W. K. Cheung C. M. Fung.
Efficient Proactive Security for Sensitive Data Storage Arun Subbiah Douglas M. Blough School of ECE, Georgia Tech {arun,
On the Node Clone Detection inWireless Sensor Networks.
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
A Workflow-Aware Storage System Emalayan Vairavanathan 1 Samer Al-Kiswany, Lauro Beltrão Costa, Zhao Zhang, Daniel S. Katz, Michael Wilde, Matei Ripeanu.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
Organization  Introduction to Network Coding  Practical Network Coding  Secure Network Coding  Structured File Sharing  Conclusion.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Analyzing the Resilience-Complexity Tradeoff of Network Coding in Dynamic P2P Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22,
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
1 Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University.
Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks, Gregory R. Ganger Carnegie Mellon University Michael K. Reiter University of North Carolina.
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
1 An Update Model for Network Coding in Cloud Storage Systems th Annual Allerton Conference on Communication, Control, and Computing Mohammad Reza.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
Figure 1.a AVS China encoder [3] Video Bit stream.
Peer-Assisted Content Distribution Pablo Rodriguez Christos Gkantsidis.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
LT Network Codes Mary-Luc Champel, Kevin Huguenin, Anne-Marie Kermarrec and Nicolas Le Scouarnec Technicolor, Rennes, France IEEE ICDCS (International.
Network Information Flow Nikhil Bhargava (2004MCS2650) Under the guidance of Prof. S.N Maheshwari (Dept. of Computer Science and Engineering) IIT, Delhi.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
20/10/ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu Institute of Network Coding Please.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Computer Performance. Hard Drive - HDD Stores your files, programs, and information. If it gets full, you can’t save any more. Measured in bytes (KB,
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Pouya Ostovari and Jie Wu Computer & Information Sciences
Key Distribution in DTNs
Network coding techniques
FlowRadar: A Better NetFlow For Data Centers
Presentation transcript:

Network Coding in P2P-Systems Christian Ortolf

Overview ● Introduction ● Galois fields ● Encoding/Decoding of Files ● Gain – Coupon Collector's problem ● Problems ● Security ● Other fields where it can be used ● Research in Freiburg

Introduction - History ● 1999 first time used R.W.Yeung and Z. Zhang, "Distributed Source Coding for Satellite Communications" ● 2000 Definition of Network Coding, Max-Flow Min-Cut Theorem in Ahlswede, R., Cai, N., Li, S.Y.R., Yeung, R.W.: Network information flow. ● 2005 through Avalanche, Network Coding gets into the media, "Network Coding for Large Scale Content Distribution", C. Gkantsidis, P. Rodriguez ● Since 2000 more than 200 Papers dealing with Network Coding

Introduction – Canonical Example ● Max-Flow – Min-Cut Theorem ● Max Flow can't be reached here without coding

Galois field – Évariste Galois ● * 25. Oktober 1811 in Bourg-la-Reine ● † 31. Mai 1832 in Paris

Galois field ● Field ● Notation ● Example: M = {0,1} with + and * defined as: + | 0 1 · | | | | | 0 1 ● Construction: Irreducible Polynomes

Galois Field – Example

Encoding of files ● From "Network Coding for Large Scale Content Distribution", C. Gkantsidis, P. Rodriguez

Encoding - Example

Decoding of Files ● Check if Coefficient vector is Helpful ● Download up to N Blocks ● Invert Matrix and Decode

Gain – Solves Coupon Collector's Problem ● Easier Protocol – Less Knowledge Exposed – Better Inscentive mechanisms possible ● High Chance to finish File if source leaves

Gain ● From "Network Coding for Large Scale Content Distribution", C. Gkantsidis, P. Rodriguez

Problems ● Small Blocks make large Coefficient Vectors – 512KB blocks on 4GB file with GF( ) makes 64MB ● CPU usage – Encoding of aBlockO(n) – DecodingO(n²) – InvertingO(n³)

Problems - CPU ● From Anatomy of a P2P Content Distribution system Gkantsidis et al ● Average: 1.4Mbit down 300Kbit/s up ● On 2GHZ Pentium 4 and 512MB ram

Security ● Usual Hashfunctions don't work – Homomorphic Hashfunctions as solution ● Very slow – Cooperative hashing ● Complex ● Needs SRCs to protect against DoS – Bulk Hashing – Secure Randomn Checksums (SRCs) ● Harder to get info from a tapped wire ● Datainjection even without Hashing nearly impossible

Other Fields where it can be used ● In Multicast Networks (example from NC Primer) ● Reduce Cost in WSN / Storage redundancy ● Network Tomography ● P2P - SAN

Research in Freiburg - TooFree ● Finding solutions for the too large CPU cost

Thank you for your Attention Questions?